2001
DOI: 10.1007/3-540-45247-8_13
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient and Practical Scheme for Privacy Protection in the E-Commerce of Digital Goods

Abstract: Abstract. It is commonly acknowledged that customers' privacy in electronic commerce should be well protected. The solutions may come not only from the ethics education and legislation, but also from cryptographic technologies. In this paper we propose and analyze a privacy protection scheme for e-commerce of digital goods. The scheme takes cryptography as its technical means to realize privacy protection for online customers. It is efficient in both computational cost and communication cost. It is very practi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
18
0

Year Published

2001
2001
2014
2014

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 31 publications
(18 citation statements)
references
References 10 publications
0
18
0
Order By: Relevance
“…Bao et al [39] and Schnorr et al [40] independently proposed similar PIR schemes using homomorphic encryption. Their schemes requires only O(1) computation to be done on-line.…”
Section: Private Information Retrievalmentioning
confidence: 99%
“…Bao et al [39] and Schnorr et al [40] independently proposed similar PIR schemes using homomorphic encryption. Their schemes requires only O(1) computation to be done on-line.…”
Section: Private Information Retrievalmentioning
confidence: 99%
“…On receipt of a pirated copy, the sequence is extracted by the trusted Technology Provider. Given the extracted sequence Y, the scores of all Buyers are computed using Equation (1). It is here that the Provider can lie, since the probabilities in p are only known by the Provider.…”
Section: Untrustworthy Content Providermentioning
confidence: 99%
“…This implies the use of a probabilistic encryption scheme. Unfortunately, semantic security has not yet been tackled in the Commutative Encryption literature [1,11,21]. Nevertheless, semantic security should be achieved in a near future, making this kind of OT particularly interesting for us.…”
Section: Details Of the Oblivious Transfer Protocolmentioning
confidence: 99%
“…Commutative cipher has been widely used in the literature for various purposes, e.g. protecting secrecy and privacy in e-commerce [2], [3], [7], data mining, information sharing [1], [8], and network routing [13]. In this work, we adopt commutative encryption to wrap the payload in layers.…”
Section: B Commutative Encryptionmentioning
confidence: 99%